GRC Access Control Architecture
Post Installation Steps – Pre Checks
Connector Configuration – ABAP & JAVA Stacks
Connector Configuration
Sync Jobs
Access Risk Analysis – Introduction
SOD Risk – Action Level & Permission Level
Critical Action Risk
Critical Permission Risk
Risk Analysis Formats, Types, Levels
Risk Simulation
Risk Remediation
Risk Mitigation
Offline & Online Risk Analysis
SOD Rules upload & Download
EAM Configuration
EAM Support – FF ID Creation, FF ID Assignment
Difference between ID based & Role based FF
Difference between Centralized & Decentralized FF Concepts
BRM – Introduction
Methodology Process and Steps, Role Imports
Business Role Concept
ARM – Introduction
User Provisioning Configuration – Request Types, Number Ranges
User Provisioning Configuration – Provisioning Settings
MSMP Workflow Configuration – Process IDs, Rules, Paths
MSMP Workflow Configuration – Customizing Agent Rules,
Customizing Initiator Rule using BRF+ Application
Workflow Testing, Troubleshooting Workflow issues
Extra Topics
top of page
$60.00Price
bottom of page